1 /*
2  * Copyright (C) 2007 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #define TRACE_TAG SOCKETS
18 
19 #include "sysdeps.h"
20 
21 #include <ctype.h>
22 #include <errno.h>
23 #include <stdio.h>
24 #include <stdlib.h>
25 #include <string.h>
26 #include <unistd.h>
27 
28 #include <algorithm>
29 #include <mutex>
30 #include <string>
31 #include <vector>
32 
33 #if !ADB_HOST
34 #include <android-base/properties.h>
35 #include <log/log_properties.h>
36 #endif
37 
38 #include "adb.h"
39 #include "adb_io.h"
40 #include "range.h"
41 #include "transport.h"
42 
43 static std::recursive_mutex& local_socket_list_lock = *new std::recursive_mutex();
44 static unsigned local_socket_next_id = 1;
45 
46 static auto& local_socket_list = *new std::vector<asocket*>();
47 
48 /* the the list of currently closing local sockets.
49 ** these have no peer anymore, but still packets to
50 ** write to their fd.
51 */
52 static auto& local_socket_closing_list = *new std::vector<asocket*>();
53 
54 // Parse the global list of sockets to find one with id |local_id|.
55 // If |peer_id| is not 0, also check that it is connected to a peer
56 // with id |peer_id|. Returns an asocket handle on success, NULL on failure.
find_local_socket(unsigned local_id,unsigned peer_id)57 asocket* find_local_socket(unsigned local_id, unsigned peer_id) {
58     asocket* result = nullptr;
59 
60     std::lock_guard<std::recursive_mutex> lock(local_socket_list_lock);
61     for (asocket* s : local_socket_list) {
62         if (s->id != local_id) {
63             continue;
64         }
65         if (peer_id == 0 || (s->peer && s->peer->id == peer_id)) {
66             result = s;
67         }
68         break;
69     }
70 
71     return result;
72 }
73 
install_local_socket(asocket * s)74 void install_local_socket(asocket* s) {
75     std::lock_guard<std::recursive_mutex> lock(local_socket_list_lock);
76 
77     s->id = local_socket_next_id++;
78 
79     // Socket ids should never be 0.
80     if (local_socket_next_id == 0) {
81         fatal("local socket id overflow");
82     }
83 
84     local_socket_list.push_back(s);
85 }
86 
remove_socket(asocket * s)87 void remove_socket(asocket* s) {
88     std::lock_guard<std::recursive_mutex> lock(local_socket_list_lock);
89     for (auto list : { &local_socket_list, &local_socket_closing_list }) {
90         list->erase(std::remove_if(list->begin(), list->end(), [s](asocket* x) { return x == s; }),
91                     list->end());
92     }
93 }
94 
close_all_sockets(atransport * t)95 void close_all_sockets(atransport* t) {
96     /* this is a little gross, but since s->close() *will* modify
97     ** the list out from under you, your options are limited.
98     */
99     std::lock_guard<std::recursive_mutex> lock(local_socket_list_lock);
100 restart:
101     for (asocket* s : local_socket_list) {
102         if (s->transport == t || (s->peer && s->peer->transport == t)) {
103             s->close(s);
104             goto restart;
105         }
106     }
107 }
108 
109 enum class SocketFlushResult {
110     Destroyed,
111     TryAgain,
112     Completed,
113 };
114 
local_socket_flush_incoming(asocket * s)115 static SocketFlushResult local_socket_flush_incoming(asocket* s) {
116     while (!s->packet_queue.empty()) {
117         Range& r = s->packet_queue.front();
118 
119         int rc = adb_write(s->fd, r.data(), r.size());
120         if (rc == static_cast<int>(r.size())) {
121             s->packet_queue.pop_front();
122         } else if (rc > 0) {
123             r.drop_front(rc);
124             fdevent_add(&s->fde, FDE_WRITE);
125             return SocketFlushResult::TryAgain;
126         } else if (rc == -1 && errno == EAGAIN) {
127             fdevent_add(&s->fde, FDE_WRITE);
128             return SocketFlushResult::TryAgain;
129         }
130 
131         // We failed to write, but it's possible that we can still read from the socket.
132         // Give that a try before giving up.
133         s->has_write_error = true;
134         break;
135     }
136 
137     // If we sent the last packet of a closing socket, we can now destroy it.
138     if (s->closing) {
139         s->close(s);
140         return SocketFlushResult::Destroyed;
141     }
142 
143     fdevent_del(&s->fde, FDE_WRITE);
144     return SocketFlushResult::Completed;
145 }
146 
147 // Returns false if the socket has been closed and destroyed as a side-effect of this function.
local_socket_flush_outgoing(asocket * s)148 static bool local_socket_flush_outgoing(asocket* s) {
149     const size_t max_payload = s->get_max_payload();
150     std::string data;
151     data.resize(max_payload);
152     char* x = &data[0];
153     size_t avail = max_payload;
154     int r = 0;
155     int is_eof = 0;
156 
157     while (avail > 0) {
158         r = adb_read(s->fd, x, avail);
159         D("LS(%d): post adb_read(fd=%d,...) r=%d (errno=%d) avail=%zu", s->id, s->fd, r,
160           r < 0 ? errno : 0, avail);
161         if (r == -1) {
162             if (errno == EAGAIN) {
163                 break;
164             }
165         } else if (r > 0) {
166             avail -= r;
167             x += r;
168             continue;
169         }
170 
171         /* r = 0 or unhandled error */
172         is_eof = 1;
173         break;
174     }
175     D("LS(%d): fd=%d post avail loop. r=%d is_eof=%d forced_eof=%d", s->id, s->fd, r, is_eof,
176       s->fde.force_eof);
177 
178     if (avail != max_payload && s->peer) {
179         data.resize(max_payload - avail);
180 
181         // s->peer->enqueue() may call s->close() and free s,
182         // so save variables for debug printing below.
183         unsigned saved_id = s->id;
184         int saved_fd = s->fd;
185         r = s->peer->enqueue(s->peer, std::move(data));
186         D("LS(%u): fd=%d post peer->enqueue(). r=%d", saved_id, saved_fd, r);
187 
188         if (r < 0) {
189             // Error return means they closed us as a side-effect and we must
190             // return immediately.
191             //
192             // Note that if we still have buffered packets, the socket will be
193             // placed on the closing socket list. This handler function will be
194             // called again to process FDE_WRITE events.
195             return false;
196         }
197 
198         if (r > 0) {
199             /* if the remote cannot accept further events,
200             ** we disable notification of READs.  They'll
201             ** be enabled again when we get a call to ready()
202             */
203             fdevent_del(&s->fde, FDE_READ);
204         }
205     }
206 
207     // Don't allow a forced eof if data is still there.
208     if ((s->fde.force_eof && !r) || is_eof) {
209         D(" closing because is_eof=%d r=%d s->fde.force_eof=%d", is_eof, r, s->fde.force_eof);
210         s->close(s);
211         return false;
212     }
213 
214     return true;
215 }
216 
local_socket_enqueue(asocket * s,std::string data)217 static int local_socket_enqueue(asocket* s, std::string data) {
218     D("LS(%d): enqueue %zu", s->id, data.size());
219 
220     Range r(std::move(data));
221     s->packet_queue.push_back(std::move(r));
222     switch (local_socket_flush_incoming(s)) {
223         case SocketFlushResult::Destroyed:
224             return -1;
225 
226         case SocketFlushResult::TryAgain:
227             return 1;
228 
229         case SocketFlushResult::Completed:
230             return 0;
231     }
232 
233     return !s->packet_queue.empty();
234 }
235 
local_socket_ready(asocket * s)236 static void local_socket_ready(asocket* s) {
237     /* far side is ready for data, pay attention to
238        readable events */
239     fdevent_add(&s->fde, FDE_READ);
240 }
241 
242 // be sure to hold the socket list lock when calling this
local_socket_destroy(asocket * s)243 static void local_socket_destroy(asocket* s) {
244     int exit_on_close = s->exit_on_close;
245 
246     D("LS(%d): destroying fde.fd=%d", s->id, s->fde.fd);
247 
248     /* IMPORTANT: the remove closes the fd
249     ** that belongs to this socket
250     */
251     fdevent_remove(&s->fde);
252 
253     remove_socket(s);
254     delete s;
255 
256     if (exit_on_close) {
257         D("local_socket_destroy: exiting");
258         exit(1);
259     }
260 }
261 
local_socket_close(asocket * s)262 static void local_socket_close(asocket* s) {
263     D("entered local_socket_close. LS(%d) fd=%d", s->id, s->fd);
264     std::lock_guard<std::recursive_mutex> lock(local_socket_list_lock);
265     if (s->peer) {
266         D("LS(%d): closing peer. peer->id=%d peer->fd=%d", s->id, s->peer->id, s->peer->fd);
267         /* Note: it's important to call shutdown before disconnecting from
268          * the peer, this ensures that remote sockets can still get the id
269          * of the local socket they're connected to, to send a CLOSE()
270          * protocol event. */
271         if (s->peer->shutdown) {
272             s->peer->shutdown(s->peer);
273         }
274         s->peer->peer = nullptr;
275         s->peer->close(s->peer);
276         s->peer = nullptr;
277     }
278 
279     /* If we are already closing, or if there are no
280     ** pending packets, destroy immediately
281     */
282     if (s->closing || s->has_write_error || s->packet_queue.empty()) {
283         int id = s->id;
284         local_socket_destroy(s);
285         D("LS(%d): closed", id);
286         return;
287     }
288 
289     /* otherwise, put on the closing list
290     */
291     D("LS(%d): closing", s->id);
292     s->closing = 1;
293     fdevent_del(&s->fde, FDE_READ);
294     remove_socket(s);
295     D("LS(%d): put on socket_closing_list fd=%d", s->id, s->fd);
296     local_socket_closing_list.push_back(s);
297     CHECK_EQ(FDE_WRITE, s->fde.state & FDE_WRITE);
298 }
299 
local_socket_event_func(int fd,unsigned ev,void * _s)300 static void local_socket_event_func(int fd, unsigned ev, void* _s) {
301     asocket* s = reinterpret_cast<asocket*>(_s);
302     D("LS(%d): event_func(fd=%d(==%d), ev=%04x)", s->id, s->fd, fd, ev);
303 
304     /* put the FDE_WRITE processing before the FDE_READ
305     ** in order to simplify the code.
306     */
307     if (ev & FDE_WRITE) {
308         switch (local_socket_flush_incoming(s)) {
309             case SocketFlushResult::Destroyed:
310                 return;
311 
312             case SocketFlushResult::TryAgain:
313                 break;
314 
315             case SocketFlushResult::Completed:
316                 s->peer->ready(s->peer);
317                 break;
318         }
319     }
320 
321     if (ev & FDE_READ) {
322         if (!local_socket_flush_outgoing(s)) {
323             return;
324         }
325     }
326 
327     if (ev & FDE_ERROR) {
328         /* this should be caught be the next read or write
329         ** catching it here means we may skip the last few
330         ** bytes of readable data.
331         */
332         D("LS(%d): FDE_ERROR (fd=%d)", s->id, s->fd);
333         return;
334     }
335 }
336 
create_local_socket(int fd)337 asocket* create_local_socket(int fd) {
338     asocket* s = new asocket();
339     s->fd = fd;
340     s->enqueue = local_socket_enqueue;
341     s->ready = local_socket_ready;
342     s->shutdown = NULL;
343     s->close = local_socket_close;
344     install_local_socket(s);
345 
346     fdevent_install(&s->fde, fd, local_socket_event_func, s);
347     D("LS(%d): created (fd=%d)", s->id, s->fd);
348     return s;
349 }
350 
create_local_service_socket(const char * name,atransport * transport)351 asocket* create_local_service_socket(const char* name, atransport* transport) {
352 #if !ADB_HOST
353     if (!strcmp(name, "jdwp")) {
354         return create_jdwp_service_socket();
355     }
356     if (!strcmp(name, "track-jdwp")) {
357         return create_jdwp_tracker_service_socket();
358     }
359 #endif
360     int fd = service_to_fd(name, transport);
361     if (fd < 0) {
362         return nullptr;
363     }
364 
365     asocket* s = create_local_socket(fd);
366     D("LS(%d): bound to '%s' via %d", s->id, name, fd);
367 
368 #if !ADB_HOST
369     if ((!strncmp(name, "root:", 5) && getuid() != 0 && __android_log_is_debuggable()) ||
370         (!strncmp(name, "unroot:", 7) && getuid() == 0) ||
371         !strncmp(name, "usb:", 4) ||
372         !strncmp(name, "tcpip:", 6)) {
373         D("LS(%d): enabling exit_on_close", s->id);
374         s->exit_on_close = 1;
375     }
376 #endif
377 
378     return s;
379 }
380 
381 #if ADB_HOST
create_host_service_socket(const char * name,const char * serial,TransportId transport_id)382 static asocket* create_host_service_socket(const char* name, const char* serial,
383                                            TransportId transport_id) {
384     asocket* s;
385 
386     s = host_service_to_socket(name, serial, transport_id);
387 
388     if (s != NULL) {
389         D("LS(%d) bound to '%s'", s->id, name);
390         return s;
391     }
392 
393     return s;
394 }
395 #endif /* ADB_HOST */
396 
remote_socket_enqueue(asocket * s,std::string data)397 static int remote_socket_enqueue(asocket* s, std::string data) {
398     D("entered remote_socket_enqueue RS(%d) WRITE fd=%d peer.fd=%d", s->id, s->fd, s->peer->fd);
399     apacket* p = get_apacket();
400 
401     p->msg.command = A_WRTE;
402     p->msg.arg0 = s->peer->id;
403     p->msg.arg1 = s->id;
404 
405     if (data.size() > MAX_PAYLOAD) {
406         put_apacket(p);
407         return -1;
408     }
409 
410     p->payload = std::move(data);
411     p->msg.data_length = p->payload.size();
412 
413     send_packet(p, s->transport);
414     return 1;
415 }
416 
remote_socket_ready(asocket * s)417 static void remote_socket_ready(asocket* s) {
418     D("entered remote_socket_ready RS(%d) OKAY fd=%d peer.fd=%d", s->id, s->fd, s->peer->fd);
419     apacket* p = get_apacket();
420     p->msg.command = A_OKAY;
421     p->msg.arg0 = s->peer->id;
422     p->msg.arg1 = s->id;
423     send_packet(p, s->transport);
424 }
425 
remote_socket_shutdown(asocket * s)426 static void remote_socket_shutdown(asocket* s) {
427     D("entered remote_socket_shutdown RS(%d) CLOSE fd=%d peer->fd=%d", s->id, s->fd,
428       s->peer ? s->peer->fd : -1);
429     apacket* p = get_apacket();
430     p->msg.command = A_CLSE;
431     if (s->peer) {
432         p->msg.arg0 = s->peer->id;
433     }
434     p->msg.arg1 = s->id;
435     send_packet(p, s->transport);
436 }
437 
remote_socket_close(asocket * s)438 static void remote_socket_close(asocket* s) {
439     if (s->peer) {
440         s->peer->peer = 0;
441         D("RS(%d) peer->close()ing peer->id=%d peer->fd=%d", s->id, s->peer->id, s->peer->fd);
442         s->peer->close(s->peer);
443     }
444     D("entered remote_socket_close RS(%d) CLOSE fd=%d peer->fd=%d", s->id, s->fd,
445       s->peer ? s->peer->fd : -1);
446     D("RS(%d): closed", s->id);
447     delete s;
448 }
449 
450 // Create a remote socket to exchange packets with a remote service through transport
451 // |t|. Where |id| is the socket id of the corresponding service on the other
452 //  side of the transport (it is allocated by the remote side and _cannot_ be 0).
453 // Returns a new non-NULL asocket handle.
create_remote_socket(unsigned id,atransport * t)454 asocket* create_remote_socket(unsigned id, atransport* t) {
455     if (id == 0) {
456         fatal("invalid remote socket id (0)");
457     }
458     asocket* s = new asocket();
459     s->id = id;
460     s->enqueue = remote_socket_enqueue;
461     s->ready = remote_socket_ready;
462     s->shutdown = remote_socket_shutdown;
463     s->close = remote_socket_close;
464     s->transport = t;
465 
466     D("RS(%d): created", s->id);
467     return s;
468 }
469 
connect_to_remote(asocket * s,const char * destination)470 void connect_to_remote(asocket* s, const char* destination) {
471     D("Connect_to_remote call RS(%d) fd=%d", s->id, s->fd);
472     apacket* p = get_apacket();
473 
474     D("LS(%d): connect('%s')", s->id, destination);
475     p->msg.command = A_OPEN;
476     p->msg.arg0 = s->id;
477 
478     // adbd expects a null-terminated string.
479     p->payload = destination;
480     p->payload.push_back('\0');
481     p->msg.data_length = p->payload.size();
482 
483     if (p->msg.data_length > s->get_max_payload()) {
484         fatal("destination oversized");
485     }
486 
487     send_packet(p, s->transport);
488 }
489 
490 /* this is used by magic sockets to rig local sockets to
491    send the go-ahead message when they connect */
local_socket_ready_notify(asocket * s)492 static void local_socket_ready_notify(asocket* s) {
493     s->ready = local_socket_ready;
494     s->shutdown = NULL;
495     s->close = local_socket_close;
496     SendOkay(s->fd);
497     s->ready(s);
498 }
499 
500 /* this is used by magic sockets to rig local sockets to
501    send the failure message if they are closed before
502    connected (to avoid closing them without a status message) */
local_socket_close_notify(asocket * s)503 static void local_socket_close_notify(asocket* s) {
504     s->ready = local_socket_ready;
505     s->shutdown = NULL;
506     s->close = local_socket_close;
507     SendFail(s->fd, "closed");
508     s->close(s);
509 }
510 
unhex(const char * s,int len)511 static unsigned unhex(const char* s, int len) {
512     unsigned n = 0, c;
513 
514     while (len-- > 0) {
515         switch ((c = *s++)) {
516             case '0':
517             case '1':
518             case '2':
519             case '3':
520             case '4':
521             case '5':
522             case '6':
523             case '7':
524             case '8':
525             case '9':
526                 c -= '0';
527                 break;
528             case 'a':
529             case 'b':
530             case 'c':
531             case 'd':
532             case 'e':
533             case 'f':
534                 c = c - 'a' + 10;
535                 break;
536             case 'A':
537             case 'B':
538             case 'C':
539             case 'D':
540             case 'E':
541             case 'F':
542                 c = c - 'A' + 10;
543                 break;
544             default:
545                 return 0xffffffff;
546         }
547 
548         n = (n << 4) | c;
549     }
550 
551     return n;
552 }
553 
554 #if ADB_HOST
555 
556 namespace internal {
557 
558 // Returns the position in |service| following the target serial parameter. Serial format can be
559 // any of:
560 //   * [tcp:|udp:]<serial>[:<port>]:<command>
561 //   * <prefix>:<serial>:<command>
562 // Where <port> must be a base-10 number and <prefix> may be any of {usb,product,model,device}.
563 //
564 // The returned pointer will point to the ':' just before <command>, or nullptr if not found.
skip_host_serial(char * service)565 char* skip_host_serial(char* service) {
566     static const std::vector<std::string>& prefixes =
567         *(new std::vector<std::string>{"usb:", "product:", "model:", "device:"});
568 
569     for (const std::string& prefix : prefixes) {
570         if (!strncmp(service, prefix.c_str(), prefix.length())) {
571             return strchr(service + prefix.length(), ':');
572         }
573     }
574 
575     // For fastboot compatibility, ignore protocol prefixes.
576     if (!strncmp(service, "tcp:", 4) || !strncmp(service, "udp:", 4)) {
577         service += 4;
578     }
579 
580     // Check for an IPv6 address. `adb connect` creates the serial number from the canonical
581     // network address so it will always have the [] delimiters.
582     if (service[0] == '[') {
583         char* ipv6_end = strchr(service, ']');
584         if (ipv6_end != nullptr) {
585             service = ipv6_end;
586         }
587     }
588 
589     // The next colon we find must either begin the port field or the command field.
590     char* colon_ptr = strchr(service, ':');
591     if (!colon_ptr) {
592         // No colon in service string.
593         return nullptr;
594     }
595 
596     // If the next field is only decimal digits and ends with another colon, it's a port.
597     char* serial_end = colon_ptr;
598     if (isdigit(serial_end[1])) {
599         serial_end++;
600         while (*serial_end && isdigit(*serial_end)) {
601             serial_end++;
602         }
603         if (*serial_end != ':') {
604             // Something other than "<port>:" was found, this must be the command field instead.
605             serial_end = colon_ptr;
606         }
607     }
608     return serial_end;
609 }
610 
611 }  // namespace internal
612 
613 #endif  // ADB_HOST
614 
smart_socket_enqueue(asocket * s,std::string data)615 static int smart_socket_enqueue(asocket* s, std::string data) {
616 #if ADB_HOST
617     char* service = nullptr;
618     char* serial = nullptr;
619     TransportId transport_id = 0;
620     TransportType type = kTransportAny;
621 #endif
622 
623     D("SS(%d): enqueue %zu", s->id, data.size());
624 
625     if (s->smart_socket_data.empty()) {
626         s->smart_socket_data = std::move(data);
627     } else {
628         std::copy(data.begin(), data.end(), std::back_inserter(s->smart_socket_data));
629     }
630 
631     /* don't bother if we can't decode the length */
632     if (s->smart_socket_data.size() < 4) {
633         return 0;
634     }
635 
636     uint32_t len = unhex(s->smart_socket_data.data(), 4);
637     if (len == 0 || len > MAX_PAYLOAD) {
638         D("SS(%d): bad size (%u)", s->id, len);
639         goto fail;
640     }
641 
642     D("SS(%d): len is %u", s->id, len);
643     /* can't do anything until we have the full header */
644     if ((len + 4) > s->smart_socket_data.size()) {
645         D("SS(%d): waiting for %zu more bytes", s->id, len + 4 - s->smart_socket_data.size());
646         return 0;
647     }
648 
649     s->smart_socket_data[len + 4] = 0;
650 
651     D("SS(%d): '%s'", s->id, (char*)(s->smart_socket_data.data() + 4));
652 
653 #if ADB_HOST
654     service = &s->smart_socket_data[4];
655     if (!strncmp(service, "host-serial:", strlen("host-serial:"))) {
656         char* serial_end;
657         service += strlen("host-serial:");
658 
659         // serial number should follow "host:" and could be a host:port string.
660         serial_end = internal::skip_host_serial(service);
661         if (serial_end) {
662             *serial_end = 0;  // terminate string
663             serial = service;
664             service = serial_end + 1;
665         }
666     } else if (!strncmp(service, "host-transport-id:", strlen("host-transport-id:"))) {
667         service += strlen("host-transport-id:");
668         transport_id = strtoll(service, &service, 10);
669 
670         if (*service != ':') {
671             return -1;
672         }
673         service++;
674     } else if (!strncmp(service, "host-usb:", strlen("host-usb:"))) {
675         type = kTransportUsb;
676         service += strlen("host-usb:");
677     } else if (!strncmp(service, "host-local:", strlen("host-local:"))) {
678         type = kTransportLocal;
679         service += strlen("host-local:");
680     } else if (!strncmp(service, "host:", strlen("host:"))) {
681         type = kTransportAny;
682         service += strlen("host:");
683     } else {
684         service = nullptr;
685     }
686 
687     if (service) {
688         asocket* s2;
689 
690         /* some requests are handled immediately -- in that
691         ** case the handle_host_request() routine has sent
692         ** the OKAY or FAIL message and all we have to do
693         ** is clean up.
694         */
695         if (handle_host_request(service, type, serial, transport_id, s->peer->fd, s) == 0) {
696             /* XXX fail message? */
697             D("SS(%d): handled host service '%s'", s->id, service);
698             goto fail;
699         }
700         if (!strncmp(service, "transport", strlen("transport"))) {
701             D("SS(%d): okay transport", s->id);
702             s->smart_socket_data.clear();
703             return 0;
704         }
705 
706         /* try to find a local service with this name.
707         ** if no such service exists, we'll fail out
708         ** and tear down here.
709         */
710         s2 = create_host_service_socket(service, serial, transport_id);
711         if (s2 == 0) {
712             D("SS(%d): couldn't create host service '%s'", s->id, service);
713             SendFail(s->peer->fd, "unknown host service");
714             goto fail;
715         }
716 
717         /* we've connected to a local host service,
718         ** so we make our peer back into a regular
719         ** local socket and bind it to the new local
720         ** service socket, acknowledge the successful
721         ** connection, and close this smart socket now
722         ** that its work is done.
723         */
724         SendOkay(s->peer->fd);
725 
726         s->peer->ready = local_socket_ready;
727         s->peer->shutdown = nullptr;
728         s->peer->close = local_socket_close;
729         s->peer->peer = s2;
730         s2->peer = s->peer;
731         s->peer = 0;
732         D("SS(%d): okay", s->id);
733         s->close(s);
734 
735         /* initial state is "ready" */
736         s2->ready(s2);
737         return 0;
738     }
739 #else /* !ADB_HOST */
740     if (s->transport == nullptr) {
741         std::string error_msg = "unknown failure";
742         s->transport = acquire_one_transport(kTransportAny, nullptr, 0, nullptr, &error_msg);
743         if (s->transport == nullptr) {
744             SendFail(s->peer->fd, error_msg);
745             goto fail;
746         }
747     }
748 #endif
749 
750     if (!s->transport) {
751         SendFail(s->peer->fd, "device offline (no transport)");
752         goto fail;
753     } else if (s->transport->GetConnectionState() == kCsOffline) {
754         /* if there's no remote we fail the connection
755          ** right here and terminate it
756          */
757         SendFail(s->peer->fd, "device offline (transport offline)");
758         goto fail;
759     }
760 
761     /* instrument our peer to pass the success or fail
762     ** message back once it connects or closes, then
763     ** detach from it, request the connection, and
764     ** tear down
765     */
766     s->peer->ready = local_socket_ready_notify;
767     s->peer->shutdown = nullptr;
768     s->peer->close = local_socket_close_notify;
769     s->peer->peer = 0;
770     /* give him our transport and upref it */
771     s->peer->transport = s->transport;
772 
773     connect_to_remote(s->peer, s->smart_socket_data.data() + 4);
774     s->peer = 0;
775     s->close(s);
776     return 1;
777 
778 fail:
779     /* we're going to close our peer as a side-effect, so
780     ** return -1 to signal that state to the local socket
781     ** who is enqueueing against us
782     */
783     s->close(s);
784     return -1;
785 }
786 
smart_socket_ready(asocket * s)787 static void smart_socket_ready(asocket* s) {
788     D("SS(%d): ready", s->id);
789 }
790 
smart_socket_close(asocket * s)791 static void smart_socket_close(asocket* s) {
792     D("SS(%d): closed", s->id);
793     if (s->peer) {
794         s->peer->peer = 0;
795         s->peer->close(s->peer);
796         s->peer = 0;
797     }
798     delete s;
799 }
800 
create_smart_socket(void)801 static asocket* create_smart_socket(void) {
802     D("Creating smart socket");
803     asocket* s = new asocket();
804     s->enqueue = smart_socket_enqueue;
805     s->ready = smart_socket_ready;
806     s->shutdown = NULL;
807     s->close = smart_socket_close;
808 
809     D("SS(%d)", s->id);
810     return s;
811 }
812 
connect_to_smartsocket(asocket * s)813 void connect_to_smartsocket(asocket* s) {
814     D("Connecting to smart socket");
815     asocket* ss = create_smart_socket();
816     s->peer = ss;
817     ss->peer = s;
818     s->ready(s);
819 }
820 
get_max_payload() const821 size_t asocket::get_max_payload() const {
822     size_t max_payload = MAX_PAYLOAD;
823     if (transport) {
824         max_payload = std::min(max_payload, transport->get_max_payload());
825     }
826     if (peer && peer->transport) {
827         max_payload = std::min(max_payload, peer->transport->get_max_payload());
828     }
829     return max_payload;
830 }
831